Please use your KuppingerCole account to log in or
create one, if you don't have it yet.
Access to corporate information often is based on binary, either/or propositions, without the context of an access request being taken into account. The level of assurance that the requesting person is who she claims to be is not determined, missing the opportunity of establishing a metric for the level of security of the connection. In the first part of this webinar, KuppingerCole Senior Analyst Dave Kearns, along with guests from Nok-Nok Labs and Certivox, will show you how going beyond passwords to a risk- and context-based authentication and authorization would help you to reach the next level, eventually even incorporating the value of the resource into the formula. If the resource is information, then the potential loss should that information be leaked also needs to be calculated. Once we´ve determined these factors, the access decision can be made: grant, deny, request further authentication or lower/raise the level of authorization.
Language: English • Duration: 56:41 • Resolution: 1280x720
Buyer’s Compass: Unified Endpoint Management
Datenbank- und Big-Data-Sicherheit
Buyer’s Compass: SOAR
Identity Governance Herausforderungen mit ForgeRock Autonomous Identity bewältigen
OT Discovery & Monitoring
Blockchain & Distributed Ledgers
Privacy Enhancement Technology
Real Time Security Monitoring & Intelligence
Privileged Access Management
Privacy and Consent Management
AI/ML in Cybersecurity